Menu

Website Hosting, VPS Hosting, and eCommerce Hosting Services

ANTI-DDOS Mitigation

GIGEBOX is committed to protecting your project 24/7 against any type of DDoS attack, regardless of duration or size.

Number of attacks per month Unlimited
Gbps limit of attack Unlimited
Duration of attacks per month Unlimited
Type of attack All
Detection and Auto-Mitigation icon
11 Tbps of additional network icon
antiddos

What is anti-DDoS protection?

As the volume of data that exists on the internet grows exponentially, distributed denial-of-service (DDoS) attacks are becoming increasingly common.

A DDoS attack aims to make a server, service or infrastructure unavailable. An attack can take on different forms.

It may saturate the server’s bandwidth to make it unreachable, or it may overwhelm the machine’s system resources.

During a DDoS attack, requests are sent in high numbers at the same time from multiple points on the internet.

The intensity of this crossfire renders the service unstable, and sometimes unavailable.

Targets and types of attacks

There are three ways of making your site, server or infrastructure unavailable:

  • Bandwidth: this type of attack consists of saturating the server's network capacity, which renders it unreachable.
  • Resources: this type of attack consists of depleting the machine's system resources, which prevents it from responding to legitimate requests.
  • Exploitation of software fault: also called "exploit", this type of attack targets a particular software fault either to make the machine unavailable or to take control of it.

What we offer to protect your services

To protect your servers an exclusive combination of techniques to prevent attack:

  • Analyse all packets at high speed in real time
  • Vacuum your server's incoming traffic
  • Mitigate the illegitimate IP packets, while allowing legitimate ones to pass through

Targets and types of attacks

There are three ways of making your site, server or infrastructure unavailable:

  • Bandwidth: this type of attack consists of saturating the server's network capacity, which renders it unreachable.
  • Resources: this type of attack consists of depleting the machine's system resources, which prevents it from responding to legitimate requests.
  • Exploitation of software fault: also called "exploit", this type of attack targets a particular software fault either to make the machine unavailable or to take control of it.

THE BEST CHOICE IN HOSTING SERVICES

Our data centers offer complete redundancy in power, HVAC, network connectivity, and security.